Sciweavers

12257 search results - page 471 / 2452
» Analysis of Algorithms
Sort
View
DAC
2007
ACM
16 years 6 months ago
Statistical Analysis of Full-Chip Leakage Power Considering Junction Tunneling Leakage
In this paper we address the the growing issue of junction tunneling leakage (Ijunc) at the circuit level. Specifically, we develop a fast approach to analyze the state-dependent ...
Tao Li, Zhiping Yu
DAC
2008
ACM
16 years 6 months ago
Symbolic noise analysis approach to computational hardware optimization
This paper addresses the problem of computational error modeling and analysis. Choosing different word-lengths for each functional unit in hardware implementations of numerical al...
Arash Ahmadi, Mark Zwolinski
148
Voted
PICS
2000
15 years 6 months ago
Slanted-Edge MTF for Digital Camera and Scanner Analysis
The development and adoption of standards for the evaluation of digital camera resolution has helped foster the widespread use of slanted-edge-based analysis. In addition, the for...
Peter D. Burns
116
Voted
APL
1993
ACM
15 years 9 months ago
Identification of Parallelism in Neural Networks by Simulation with Language J.
: The problem of a finding of ranging of the objects nearest to the cyclic relation set by the expert between objects is considered. Formalization of the problem arising at it is r...
Alexei N. Skurikhin, Alvin J. Surkan
122
Voted
ISI
2008
Springer
15 years 5 months ago
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies
This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analy...
Nasrullah Memon, Henrik Legind Larsen, David L. Hi...